May 11, 2018
Via: CSO OnlineEndpoint security is in many ways the direct descendent of the first forms of computer protection in the earliest days of IT. But it’s a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones […]
March 27, 2018
Via: Dark ReadingAVCrypt tries to disable anti-malware software before it can be detected and removed. A newly discovered ransomware variant attempts to remove any anti-malware protection in place on a victim’s computer before it begins its nefarious work. A group of researchers […]
March 15, 2018
Via: Threat PostA new family of point-of-sale malware, dubbed PinkKite, has been identified by researchers who say the malware is tiny in size, but can delivered a hefty blow to POS endpoints. Researchers at Kroll Cyber Security first identified PinkKite in 2017 […]
February 2, 2018
Via: Security IntelligenceEndpoint management is typically the responsibility of the IT operations or infrastructure teams, not the security team. So why should security care about endpoint hygiene? Pervasive Endpoint Vulnerabilities Attacks come from all directions, and many of them originate on endpoints. […]
January 5, 2018
Via: CSO OnlineThere is a great need for sweeping changes, more so than most know. The Cyber War continues to heat up and no enterprise is left on the sideline. Smaller business are being left for dead, successful ransomware attacks are driving […]
October 10, 2017
Via: Security IntelligenceWhile we sometimes hear the term endpoint security used to describe the needs of both enterprises and individual consumers, the two differ greatly. Consumer endpoint security often refers to standard retail internet security packages consisting of antimalware, antispam and a […]
July 25, 2017
Via: Security WeekWhen I worked as a Principal Researcher at RSA Labs around year 2000, I was tasked to identify what might affect our revenue stream. “Anything,” I thought. Upon further reflection, I argued that criminals would start trying to steal passwords […]
May 10, 2017
Via: Security IntelligenceIt is becoming increasingly critical to manage both unknown and known vulnerabilities. In fact, since even novice cybercriminals can exploit publicly disclosed issues, it may be even more important to manage known vulnerabilities. Furthermore, fraudsters can examine information associated with […]
Threats & Malware, Virus & Malware
August 30, 2016
Via: CSO OnlineOrganizations are quickly learning that keeping the bad guys out of an enterprise environment isn’t as simple as deploying firewalls and antivirus. As cybercriminals utilize customized malware and bypass traditional antivirus solutions, it’s become necessary to take a broader and […]
October 21, 2015
Via: Cyber WarfareA slew of startups and veteran #security firms are moving toward proactive and adaptive detection and mitigation for securing the #endpoint. But few enterprises are ready to pull the antivirus plug. #endpoint security is undergoing a major renaissance with a […]
August 16, 2015
Via: vulnerabilitiesSecurity professionals are most concerned about the endpoint, citing it as the greatest source of risk in a Bromium survey of more than 100 pros who attended Black Hat USA 2015 in Las Vegas last week. That’s not surprising to […]
April 30, 2024
April 11, 2024
April 30, 2024